Search results for "NETWORKS"

showing 10 items of 3260 documents

StateOS : A Memory-Efficient Hybrid Operating System for IoT Devices

2023

The increasing significance of operating systems (OSs) in the development of the internet of things (IoT) has emerged in the last decade. An event-driven OS is memory efficient and suitable for resource-constrained IoT devices and wireless sensors, although the program’s control flow, which is determined by events, is not always obvious. A multithreaded OS with sequential control flow is often considered clearer. However, this approach is memory-consuming. A hybrid OS seeks to combine the strengths of the event-driven approach with multithreaded approach. An event-driven cooperative threaded OS represents a hybrid approach that supports concurrency by explicitly yielding control to another …

cooperative programmingkäyttöjärjestelmätComputer Networks and Communicationsinternet of thingsComputer Science Applicationshybrid operating systemHardware and ArchitectureIoT OSSignal ProcessingWSN OSesineiden internetohjelmointitietoverkotwireless sensor network operating systemInformation Systems
researchProduct

Cell degradation detection based on an inter-cell approach

2017

Fault management is a crucial part of cellular network management systems. The status of the base stations is usually monitored by well-defined key performance indicators (KPIs). The approaches for cell degradation detection are based on either intra-cell or inter-cell analysis of the KPIs. In intra-cell analysis, KPI profiles are built based on their local history data whereas in inter-cell analysis, KPIs of one cell are compared with the corresponding KPIs of the other cells. In this work, we argue in favor of the inter-cell approach and apply a degradation detection method that is able to detect a sleeping cell that could be difficult to observe using traditional intra-cell methods. We d…

correlation based cell degradation detectionreal LTE networknetwork management automationself-healinglong term evolution (LTE)network managementself-organizing networks (SON)fault managementinter-cell analysissiirrokset
researchProduct

Implementation of quality cost management tool in dyadic purchaser-provider relationship context

2012

cost managementrahoitustilaaja-tuottajamallitnetworkspublic sectorcontingency theorysäästötjulkinen sektorikustannuslaskentavarainhankintakustannukset
researchProduct

Creating Shared Value: Exploration in an Entrepreneurial Ecosystem

2022

The effects of companies on society and the practices of Corporate Social Responsibility have been the source of interest for many research studies. Questions concerning the traditional model resulted in Porter and Kramer developing the concept of Creating Shared Value, an approach where companies consider the value of society and the environment in their business models, creating value for all stakeholders. We take the issue of shared value creation in an entrepreneurial ecosystem to determine how clustered companies understand and create shared value, identifying its antecedents and consequences. Using a single case study, we were able to identify that the entrepreneurial ecosystem become…

creating shared value; value co-creation; entrepreneurial ecosystem; business networks; case study; environmentEmprenedoriaRenewable Energy Sustainability and the EnvironmentCreativitat en els negocisGeography Planning and DevelopmentEconomia Mètodes estadísticsBuilding and ConstructionManagement Monitoring Policy and LawMàrquetingSustainability
researchProduct

Effects of Transcranial Direct Current Stimulation on Brain Networks Related to Creative Thinking

2020

AbstractHuman creative thinking is unique and capable of generating novel and valuable ideas. Recent research has clarified the contribution of different brain networks (default mode network, DN; executive control network; salience network) to creative thinking. However, the effects of brain stimulation on brain networks during creative thinking and on creative performance have not been clarified. The present study was designed to examine the changes in functional connectivity (FC) and effective connectivity (EC) of the large-scale brain network, and the ensuing changes in creative performance, induced by transcranial direct current stimulation (tDCS). Fourteen healthy male students underwe…

creative thinkingeffective connectivitymedicine.medical_treatmentStimulationElectroencephalography050105 experimental psychologylcsh:RC321-57103 medical and health sciencesBehavioral Neuroscience0302 clinical medicineCortex (anatomy)medicine0501 psychology and cognitive scienceslcsh:Neurosciences. Biological psychiatry. NeuropsychiatryBiological PsychiatryDefault mode networkcreativityOriginal ResearchTemporal cortexmedicine.diagnostic_testTranscranial direct-current stimulationfunctional connectivity05 social sciencesbrain networksdivergent thinkingPsychiatry and Mental healthNeuropsychology and Physiological Psychologymedicine.anatomical_structureNeurologyBrain stimulationPosterior cingulatesense organstranscranial direct current stimulationPsychologyDivergent thinkingNeuroscience030217 neurology & neurosurgeryelectroencephalographyNeuroscienceFrontiers in Human Neuroscience
researchProduct

Towards digital cognitive clones for the decision-makers: adversarial training experiments

2021

Abstract There can be many reasons for anyone to make a digital copy (clone) of own decision-making behavior. This enables virtual presence of a professional decision-maker simultaneously in many places and processes of Industry 4.0. Such clone can be used as one’s responsible representative when the human is not available. Pi-Mind (“Patented Intelligence”) is a technology, which enables “cloning” cognitive skills of humans using adversarial machine learning. In this paper, we present a cyber-physical environment as an adversarial learning ecosystem for cloning image classification skills. The physical component of the environment is provided by the logistic laboratory with camera-surveilla…

cybersecurityComputer scienceProcess (engineering)päätöksentukijärjestelmätneuroverkot02 engineering and technologytekoälyAdversarial machine learningAdversarial systemHuman–computer interactionComponent (UML)0202 electrical engineering electronic engineering information engineeringesineiden internetartificial digital immunitykyberturvallisuusGeneral Environmental ScienceGenerative Adversarial NetworksCloning (programming)ohjausjärjestelmät020206 networking & telecommunicationsAdversaryIndustry 4.0koneoppiminenälytekniikkaGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingClone (computing)Procedia Computer Science
researchProduct

Taxonomy of generative adversarial networks for digital immunity of Industry 4.0 systems

2021

Abstract Industry 4.0 systems are extensively using artificial intelligence (AI) to enable smartness, automation and flexibility within variety of processes. Due to the importance of the systems, they are potential targets for attackers trying to take control over the critical processes. Attackers use various vulnerabilities of such systems including specific vulnerabilities of AI components. It is important to make sure that inappropriate adversarial content will not break the security walls and will not harm the decision logic of critical systems. We believe that the corresponding security toolset must be organized as a trainable self-protection mechanism similar to immunity. We found cer…

cybersecurityIndustry 4.0Computer scienceVulnerabilityneuroverkot02 engineering and technologytekoälyComputer securitycomputer.software_genreAdversarial systemImmunityTaxonomy (general)0202 electrical engineering electronic engineering information engineeringesineiden internetartificial digital immunitykyberturvallisuusGeneral Environmental ScienceFlexibility (engineering)Generative Adversarial Networksbusiness.industryMechanism (biology)020206 networking & telecommunicationsIndustry 4.0AutomationVariety (cybernetics)koneoppiminenälytekniikkaGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingbusinesscomputerProcedia Computer Science
researchProduct

Col : A Data Collection Protocol for Vanet

2012

International audience; In this paper, we present a protocol to collect data within a vehicular ad hoc network (VANET). In spite of the intrinsic dynamic of such network, our protocol simultaneously offers three relevant properties: (1) It allows any vehicle to collect data beyond its direct neighborhood (i.e., vehicles within direct communication range) using vehicle-to-vehicle communications only (i.e., the infrastructure is not required); (2) It tolerates possible network partitions; (3) It works on demand and stops when the data collection is achieved. To the best of our knowledge, this is the first collect protocol having these three characteristics. All that is chiefly obtained thanks…

data collection protocolVehicular communication systemsVANETCorrectnessnetwork operator antComputer sciencedata acquisitionDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]self-stabilization area02 engineering and technologyVehicle dynamics[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Transient analysis[SPI]Engineering Sciences [physics]0203 mechanical engineeringvehicular ad hoc networkvehicle to vehicle communication0202 electrical engineering electronic engineering information engineeringAlgorithm design and analysisHeuristic algorithmsCOL algorithmProtocol (object-oriented programming)ComputingMilieux_MISCELLANEOUSAirplug software distributionVehicular ad hoc networkData collectionbusiness.industryNetwork partitionnetwork partition020206 networking & telecommunications020302 automobile design & engineeringVehiclesSoftware distributionRoadsAlgorithm designvehicular ad hoc networksbusinessProtocolsComputer network
researchProduct

UAV-Assisted Data Collection in Wireless Sensor Networks: A Comprehensive Survey

2021

Wireless sensor networks (WSNs) are usually deployed to different areas of interest to sense phenomena, process sensed data, and take actions accordingly. The networks are integrated with many advanced technologies to be able to fulfill their tasks that is becoming more and more complicated. These networks tend to connect to multimedia networks and to process huge data over long distances. Due to the limited resources of static sensor nodes, WSNs need to cooperate with mobile robots such as unmanned ground vehicles (UGVs), or unmanned aerial vehicles (UAVs) in their developments. The mobile devices show their maneuverability, computational and energy-storage abilities to support WSNs in mul…

data collection scenariosTK7800-8360Computer Networks and CommunicationsProcess (engineering)Computer scienceDistributed computingComputerApplications_COMPUTERSINOTHERSYSTEMSwireless sensor networks (WSNs)mobile robotsenergy consumptionComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSunmanned aerial vehicles (UAVs)Electrical and Electronic EngineeringData collectionControl algorithmcommunication structuresCommunication structures Control algorithms Data collection scenarios Energy consumption Mobile robots Unmanned aerial vehicles (UAVs) Wireless sensor networks (WSNs)Mobile robotEnergy consumptionSettore ING-IND/31 - ElettrotecnicaHardware and ArchitectureControl and Systems EngineeringSignal Processingcontrol algorithmsElectronicsMobile deviceWireless sensor networkLimited resourcesElectronics
researchProduct

LPV model identification for gain scheduling control: An application to rotating stall and surge control problem

2006

Abstract We approach the problem of identifying a nonlinear plant by parameterizing its dynamics as a linear parameter varying (LPV) model. The system under consideration is the Moore–Greitzer model which captures surge and stall phenomena in compressors. The control task is formulated as a problem of output regulation at various set points (stable and unstable) of the system under inputs and states constraints. We assume that inputs, outputs and scheduling parameters are measurable. It is worth pointing out that the adopted technique allows for identification of an LPV model's coefficients without the requirements of slow variations amongst set points. An example of combined identification…

decentralized controlEngineeringbusiness.industryApplied MathematicsSystem identificationStall (fluid mechanics)Control engineeringconsensus protocolOptimal controlconsensus protocolsDecentralised systemComputer Science Applicationsoptimal controlNonlinear systemGain schedulingControl and Systems EngineeringControl theorynetworksSettore MAT/09 - Ricerca OperativaElectrical and Electronic EngineeringSurgebusinessSurge controlconsensus protocols; decentralized control; optimal control; networksControl Engineering Practice
researchProduct